Model Performance Evaluation

Machine Unlearning for Traditional Models and Large Language Models: A Short Survey

Authors: Yi Xu | Published: 2024-04-01
Data Privacy Assessment
Model Performance Evaluation
Machine Unlearning

Enhancing Reasoning Capacity of SLM using Cognitive Enhancement

Authors: Jonathan Pan, Swee Liang Wong, Xin Wei Chia, Yidi Yuan | Published: 2024-04-01
LLM Performance Evaluation
Model Performance Evaluation
Log Analysis Method

Can ChatGPT Detect DeepFakes? A Study of Using Multimodal Large Language Models for Media Forensics

Authors: Shan Jia, Reilin Lyu, Kangran Zhao, Yize Chen, Zhiyuan Yan, Yan Ju, Chuanbo Hu, Xin Li, Baoyuan Wu, Siwei Lyu | Published: 2024-03-21 | Updated: 2024-06-11
LLM Performance Evaluation
Model Performance Evaluation
Watermark Evaluation

Thwarting Cybersecurity Attacks with Explainable Concept Drift

Authors: Ibrahim Shaer, Abdallah Shami | Published: 2024-03-18
Cybersecurity
Model Performance Evaluation
Concept Drift

Hierarchical Classification for Intrusion Detection System: Effective Design and Empirical Analysis

Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17
Training Data Extraction Method
Model Performance Evaluation
Hierarchical Classification Methods

A Sophisticated Framework for the Accurate Detection of Phishing Websites

Authors: Asif Newaz, Farhan Shahriyar Haq, Nadim Ahmed | Published: 2024-03-13
Phishing Detection
Framework
Model Performance Evaluation

SoK: Reducing the Vulnerability of Fine-tuned Language Models to Membership Inference Attacks

Authors: Guy Amit, Abigail Goldsteen, Ariel Farkash | Published: 2024-03-13
Privacy Protection Method
Membership Inference
Model Performance Evaluation

DNNShield: Embedding Identifiers for Deep Neural Network Ownership Verification

Authors: Jasper Stang, Torsten Krauß, Alexandra Dmitrienko | Published: 2024-03-11
DNN IP Protection Method
Watermarking
Model Performance Evaluation

A Photonic Physically Unclonable Function’s Resilience to Multiple-Valued Machine Learning Attacks

Authors: Jessie M. Henderson, Elena R. Henderson, Clayton A. Harper, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton | Published: 2024-03-02
Watermarking
Model Performance Evaluation
Machine Learning Method

Differentially Private Knowledge Distillation via Synthetic Text Generation

Authors: James Flemings, Murali Annavaram | Published: 2024-03-01 | Updated: 2024-06-05
Data Generation
Privacy Protection Method
Model Performance Evaluation